Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Analysis and Commentary

How Might The Sleeper Agents From “The Americans” Interfere In The Election?

by Herbert Lin, Steven Webervia Lawfare
Tuesday, August 4, 2020

As the November 2020 presidential election approaches, it is worth imagining how a foreign adversary might attempt to intervene in the domestic political process. We have no evidence that any of the precise things we consider in this essay are actually happening—though some may well be. They are based on a review of what we know to be possible and plausible given what has occurred in the past and the vulnerabilities we can see clearly today. 

Blank Section (Placeholder)EssaysAnalysis and Commentary

Defend Forward And Cyber Countermeasures

by Ashley Deeksvia Aegis Paper Series
Tuesday, August 4, 2020

Understanding when and how states may lawfully deploy countermeasures is critical for states operating in the cyber arena—not only to understand their own options when injured but also to anticipate the responses that their cyber activities may trigger from other states. This essay examines the role that countermeasures may play in the US cyber strategy of Defend Forward and argues that some states are developing a lex specialis of cyber countermeasures.

The Classicist with Victor Davis Hanson:
Blank Section (Placeholder)Analysis and Commentary

The Classicist: Trump’s Jacksonian Realism

interview with Victor Davis Hansonvia The Classicist
Friday, July 31, 2020

The president defied conventional wisdom on foreign policy — and has largely been proven right.

Blank Section (Placeholder)Essays

The Domestic Legal Framework for US Military Cyber Operations

by Robert Chesneyvia Aegis Paper Series
Wednesday, July 29, 2020

With little fanfare, Congress and the executive branch have cooperated effectively over the past decade to build a legal architecture for military cyber operations. The resulting framework is not a familiar one to most observers, especially when compared to the parallel frameworks associated with conventional military operations and with intelligence activities. Yet it is no less important and worthy of study, particularly in light of the Pentagon’s commitment to the “defend forward” operational model.

Blank Section (Placeholder)

Amy Zegart: Spies, Lies, And Algorithms | Hoover Virtual Policy Briefing

interview with Amy Zegartvia Hoover Podcasts
Tuesday, July 28, 2020

Amy Zegart Discusses Spies, Lies, and Algorithms.

Analysis and Commentary

Why China's Race For AI Dominance Depends On Math

by Michael R. Auslinvia National Interest
Friday, July 3, 2020

Forget about “AI” itself: it’s all about the math, and America is failing to train enough citizens in the right kinds of mathematics to remain dominant.

In the News

Fraud Is A ‘Continuous, Collaborative Fight’ Warns AU10TIX

quoting Niall Fergusonvia The Fintech Times
Monday, June 29, 2020

In this 30 minute video interview, Mark Walker at The Fintech Times chats to David Birch, an internationally recognised thought leader in digital identity and a member of the AU10TIX advisory board, and Carey O’Connor Kolaja, President and Chief Operating Officer of AU10TIX about the launch of INSTINCT.

Analysis and Commentary

A Strategic Cyber No-FirstUse Policy? Addressing The US Cyber Strategy Problem

by Jacquelyn Schneidervia The Washington Quarterly
Wednesday, June 17, 2020

In June of 2019, the New York Times reported that the United States was “stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin.” The reporters accused the United States of planting malware within Russian critical infrastructure under new authorities granted by the White House to the Department of Defense (DoD) for offensive cyber operations. 

Blank Section (Placeholder)

Jacquelyn Schneider And Herb Lin: Cyber Power And Peril In The Post-COVID World | Hoover Virtual Policy Briefing

interview with Herbert Lin, Jacquelyn Schneidervia Hoover Podcasts
Tuesday, June 2, 2020

Jacquelyn Schneider And Herb Lin discuss Cyber Power And Peril In the Post-COVID World.

Analysis and CommentaryBlank Section (Placeholder)

Cybersecurity Lessons From The Pandemic, Or Pandemic Lessons From Cybersecurity

by Herbert Linvia Lawfare
Tuesday, June 2, 2020

Fred Cohen was the first person to introduce the term “computer virus.” In a 1984 paper, he defined it as “a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself. With the infection property, a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs. Every program that gets infected may also act as a virus and thus the infection grows.” 

Pages

Watch the LiveStream!